πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Attack Surface, Vulnerabilities Increase as Orgs Respond to COVID-19 Crisis πŸ•΄

In typical fashion, attackers are gearing up to take advantage of the surge in teleworking prompted by the pandemic.

πŸ“– Read

via "Dark Reading: ".
❌ Covid-19 Spurs Facial Recognition Tracking, Privacy Fears ❌

The coronavirus pandemic is creating a lucrative market for facial recognition manufacturers. But privacy issues need to be top of mind, tech experts warn.

πŸ“– Read

via "Threatpost".
πŸ” Friday Five: 3/20 Edition πŸ”

Hackers take advantage of the COVID-19 pandemic, Magecart group targets NutriBullet, and many countries at risk for violating data privacy laws - catch up on the week's infosec news with this roundup!

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Security Ratings Are a Dangerous Fantasy πŸ•΄

They don't predict breaches, and they don't help people make valuable business decisions or make users any safer.

πŸ“– Read

via "Dark Reading: ".
⚠ Exchange rate service’s customer details hacked via AWS ⚠

Online exchange rate data provider Open Exchange Rates has exposed an undisclosed amount of user data via an Amazon database.

πŸ“– Read

via "Naked Security".
πŸ” TrickBot and Emotet strains make process injection most prevalent attack technique πŸ”

A Red Canary study analyzed six million leads to determine threats and found that worms had the most significant impact in 2019.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Network address-based security: How to implement better controls πŸ”

Traditional network address-based security controls aren't as effective for the cloud or internal networks. Here's what to do about these security issues.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2019-10221

A Reflected Cross Site Scripting vulnerability was found in all pki-core 10.x.x versions, where the pki-ca module from the pki-core server. This flaw is caused by missing sanitization of the GET URL parameters. An attacker could abuse this flaw to trick an authenticated user into clicking a specially crafted link which can execute arbitrary code when viewed in a browser.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-10179

A vulnerability was found in all pki-core 10.x.x versions, where the Key Recovery Authority (KRA) Agent Service did not properly sanitize recovery request search page, enabling a Reflected Cross Site Scripting (XSS) vulnerability. An attacker could trick an authenticated victim into executing specially crafted Javascript code.

πŸ“– Read

via "National Vulnerability Database".
πŸ” How to create a Kubernetes security policy πŸ”

If you're looking to take your Kubernetes security to the next level, you'll want to start working with pod security policies. Here's a quick introduction to this feature.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Proof of Concept Released for kr00k Wi-Fi Vulnerability πŸ•΄

The code demonstrates a relatively simple method to exploit a vulnerability in more than a billion devices.

πŸ“– Read

via "Dark Reading: ".
⚠ Trolls ZoomBomb work-from-home videocall with filth ⚠

Trolls have been joining videoconferencing calls to expose meeting participants to disturbing videos.

πŸ“– Read

via "Naked Security".
⚠ S2 Ep31: Remote working, malwareless ransomware and EARN IT – Naked Security Podcast ⚠

Listen to the latest episode now!

πŸ“– Read

via "Naked Security".
πŸ” How to deal with network security and bandwidth issues during the coronavirus pandemic πŸ”

Experts discuss what precautions companies need to be taking right now that a record number of people are working outside of offices.

πŸ“– Read

via "Security on TechRepublic".
❌ News Wrap, Coronavirus Edition: WFH Security Woes, Pwn2Own ❌

Threatpost editors discuss this week's top news stories from COVID-19 themed malware attacks to Pwn2Own updates.

πŸ“– Read

via "Threatpost".
πŸ•΄ Dark Reading Cybersecurity Crossword Puzzle πŸ•΄

Here's a little something to snuggle up with if you're on lockdown.

πŸ“– Read

via "Dark Reading: ".
❌ Defying Covid-19’s Pall: Pwn2Own Goes Virtual ❌

Hacking contest goes virtual with participants remotely winning $295k in prizes for taking down Adobe Reader, Safari and Ubuntu.

πŸ“– Read

via "Threatpost".
❌ Revamped HawkEye Keylogger Swoops in on Coronavirus Fears ❌

Emails claiming to be directly from WHO’s Dr. Tedros Adhanom Ghebreyesus offer "drug advice" -- and malware infections.

πŸ“– Read

via "Threatpost".
πŸ•΄ 200M Records of US Citizens Leaked in Unprotected Database πŸ•΄

Researchers have not determined who owns the database, which was one of several large exposed instances disclosed this week.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2019-11574

An issue was discovered in Simple Machines Forum (SMF) before release 2.0.17. There is SSRF related to Subs-Package.php and Subs.php because user-supplied data is used directly in curl calls.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2013-7487

On Swann DVR04B, DVR08B, DVR-16CIF, and DVR16B devices, raysharpdvr application has a vulnerable call to Ò€œsystemҀ�, which allows remote attackers to execute arbitrary code via TCP port 9000.

πŸ“– Read

via "National Vulnerability Database".